SlideShare a Scribd company logo
1 of 2
1. What are the three fundamental elements of an effective security program for information
systems? 2. Of these three fundamental controls, which two are used by the Domain User Admin
to create users and assign rights to resources? 3. If you can browse a file on a Windows network
share, but are not able to copy it or modify it, what types of access controls and permissions are
probably configured? 4. What is the mechanism on a Windows server that lets you administer
granular policies and permissions on a Windows network using role based access? 5. What is
two-factor authentication, and why is it an effective access control technique? 6. Relate how
Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A
for departmental LANs, departmental folders, and data. 7. Is it a good practice to include the
account or username in the password? Why or why not?
Solution
Answer:
1. Identification, Authentication, and Authorization are the three fundamental elements of an
effective security program for information systems.
2.Authentication and Authorization are the two elements, used by the Domain User Admin to
create users and assign rights to resources.
3. read and write permissions should be properly configured. The file access type should be set to
read only.
4. Group Policy Editor is used to administer granular policies and
permissions on a Windows network using role-based access.
5. The two-factor authentication is a process, requires two different type of identification, such as
an ID card and a pin code / password. The user must authenticate with two forms of ID to prove
thier identity. So it is effective.
6.In Windows Server 2008 R2, permissions can be set for files and folders.o grant a user, access
only to files owned by him and prevent him from accessing any others.
7.Including the account or username in the password is absolutely not a good or suggested
practice. It is a common starting place for hackers when attempting to log in to someone’s
account or when trying to use another person’s access.
1- What are the three fundamental elements of an effective security pr.docx

More Related Content

Similar to 1- What are the three fundamental elements of an effective security pr.docx

IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active DirectoryIRJET Journal
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Michael Noel
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Instituteeshwarvisualpath
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...appsec
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsMike Taylor
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphsMike Taylor
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatLyndonPelletier761
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 

Similar to 1- What are the three fundamental elements of an effective security pr.docx (20)

IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active Directory
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Paper2
Paper2Paper2
Paper2
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive Graphs
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relat
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 

More from todd991

14- Which of the following is the correct name for NalICO- A- Sodiuns.docx
14- Which of the following is the correct name for NalICO- A- Sodiuns.docx14- Which of the following is the correct name for NalICO- A- Sodiuns.docx
14- Which of the following is the correct name for NalICO- A- Sodiuns.docxtodd991
 
14 Income tax is estimated at 40- of income- What factors other than e.docx
14 Income tax is estimated at 40- of income- What factors other than e.docx14 Income tax is estimated at 40- of income- What factors other than e.docx
14 Income tax is estimated at 40- of income- What factors other than e.docxtodd991
 
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docxtodd991
 
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docxtodd991
 
10- Consider the following data structure used for implementing a link.docx
10- Consider the following data structure used for implementing a link.docx10- Consider the following data structure used for implementing a link.docx
10- Consider the following data structure used for implementing a link.docxtodd991
 
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docxtodd991
 
1-What are the consequences of long term unemployment- 2-Should the go.docx
1-What are the consequences of long term unemployment- 2-Should the go.docx1-What are the consequences of long term unemployment- 2-Should the go.docx
1-What are the consequences of long term unemployment- 2-Should the go.docxtodd991
 
1-What is the conjugate base of H2C2O4- 2-Which of the following acid.docx
1-What is the conjugate base of H2C2O4-  2-Which of the following acid.docx1-What is the conjugate base of H2C2O4-  2-Which of the following acid.docx
1-What is the conjugate base of H2C2O4- 2-Which of the following acid.docxtodd991
 
1-The fund financial statements for governmental funds should include.docx
1-The fund financial statements for governmental funds should include.docx1-The fund financial statements for governmental funds should include.docx
1-The fund financial statements for governmental funds should include.docxtodd991
 
1-To a young researcher- what are the advantages of using the method o.docx
1-To a young researcher- what are the advantages of using the method o.docx1-To a young researcher- what are the advantages of using the method o.docx
1-To a young researcher- what are the advantages of using the method o.docxtodd991
 
1-The party to receive a distribution of principal from an estate is l.docx
1-The party to receive a distribution of principal from an estate is l.docx1-The party to receive a distribution of principal from an estate is l.docx
1-The party to receive a distribution of principal from an estate is l.docxtodd991
 
1-Consider an organization with which you have been affiliated as an e.docx
1-Consider an organization with which you have been affiliated as an e.docx1-Consider an organization with which you have been affiliated as an e.docx
1-Consider an organization with which you have been affiliated as an e.docxtodd991
 
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docxtodd991
 
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docxtodd991
 
1- You align 2 lenses together with known focal lengths fi and fa- The.docx
1- You align 2 lenses together with known focal lengths fi and fa- The.docx1- You align 2 lenses together with known focal lengths fi and fa- The.docx
1- You align 2 lenses together with known focal lengths fi and fa- The.docxtodd991
 
1- What were some of the major work published by Thomas Maithus- emplo.docx
1- What were some of the major work published by Thomas Maithus- emplo.docx1- What were some of the major work published by Thomas Maithus- emplo.docx
1- What were some of the major work published by Thomas Maithus- emplo.docxtodd991
 
1- What are the advantages and disadvantages of each of sociologys mai.docx
1- What are the advantages and disadvantages of each of sociologys mai.docx1- What are the advantages and disadvantages of each of sociologys mai.docx
1- What are the advantages and disadvantages of each of sociologys mai.docxtodd991
 
1- What are the various theories that we use to explain why people com.docx
1- What are the various theories that we use to explain why people com.docx1- What are the various theories that we use to explain why people com.docx
1- What are the various theories that we use to explain why people com.docxtodd991
 
1- Return the names- IDS- and average salary of the top 10 employees w.docx
1- Return the names- IDS- and average salary of the top 10 employees w.docx1- Return the names- IDS- and average salary of the top 10 employees w.docx
1- Return the names- IDS- and average salary of the top 10 employees w.docxtodd991
 
1- Research has shown that a- homogeneous groups are more creative tha.docx
1- Research has shown that a- homogeneous groups are more creative tha.docx1- Research has shown that a- homogeneous groups are more creative tha.docx
1- Research has shown that a- homogeneous groups are more creative tha.docxtodd991
 

More from todd991 (20)

14- Which of the following is the correct name for NalICO- A- Sodiuns.docx
14- Which of the following is the correct name for NalICO- A- Sodiuns.docx14- Which of the following is the correct name for NalICO- A- Sodiuns.docx
14- Which of the following is the correct name for NalICO- A- Sodiuns.docx
 
14 Income tax is estimated at 40- of income- What factors other than e.docx
14 Income tax is estimated at 40- of income- What factors other than e.docx14 Income tax is estimated at 40- of income- What factors other than e.docx
14 Income tax is estimated at 40- of income- What factors other than e.docx
 
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx
12-19 Notes Compare and contrast the Hubble Space Telescope with James.docx
 
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx
12-5 Distribution of Cash Upon Liquidation Manley and Singh are partne.docx
 
10- Consider the following data structure used for implementing a link.docx
10- Consider the following data structure used for implementing a link.docx10- Consider the following data structure used for implementing a link.docx
10- Consider the following data structure used for implementing a link.docx
 
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx
10 Solution#include-iostream-h- #include-conio-h- #include-process-h-.docx
 
1-What are the consequences of long term unemployment- 2-Should the go.docx
1-What are the consequences of long term unemployment- 2-Should the go.docx1-What are the consequences of long term unemployment- 2-Should the go.docx
1-What are the consequences of long term unemployment- 2-Should the go.docx
 
1-What is the conjugate base of H2C2O4- 2-Which of the following acid.docx
1-What is the conjugate base of H2C2O4-  2-Which of the following acid.docx1-What is the conjugate base of H2C2O4-  2-Which of the following acid.docx
1-What is the conjugate base of H2C2O4- 2-Which of the following acid.docx
 
1-The fund financial statements for governmental funds should include.docx
1-The fund financial statements for governmental funds should include.docx1-The fund financial statements for governmental funds should include.docx
1-The fund financial statements for governmental funds should include.docx
 
1-To a young researcher- what are the advantages of using the method o.docx
1-To a young researcher- what are the advantages of using the method o.docx1-To a young researcher- what are the advantages of using the method o.docx
1-To a young researcher- what are the advantages of using the method o.docx
 
1-The party to receive a distribution of principal from an estate is l.docx
1-The party to receive a distribution of principal from an estate is l.docx1-The party to receive a distribution of principal from an estate is l.docx
1-The party to receive a distribution of principal from an estate is l.docx
 
1-Consider an organization with which you have been affiliated as an e.docx
1-Consider an organization with which you have been affiliated as an e.docx1-Consider an organization with which you have been affiliated as an e.docx
1-Consider an organization with which you have been affiliated as an e.docx
 
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx
1-Astronomers estimate that a low-mass red dwarf star like Proxima Cen.docx
 
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx
1-a Which of TCP or UDP is connection-less- Which of TCP or UDP is con.docx
 
1- You align 2 lenses together with known focal lengths fi and fa- The.docx
1- You align 2 lenses together with known focal lengths fi and fa- The.docx1- You align 2 lenses together with known focal lengths fi and fa- The.docx
1- You align 2 lenses together with known focal lengths fi and fa- The.docx
 
1- What were some of the major work published by Thomas Maithus- emplo.docx
1- What were some of the major work published by Thomas Maithus- emplo.docx1- What were some of the major work published by Thomas Maithus- emplo.docx
1- What were some of the major work published by Thomas Maithus- emplo.docx
 
1- What are the advantages and disadvantages of each of sociologys mai.docx
1- What are the advantages and disadvantages of each of sociologys mai.docx1- What are the advantages and disadvantages of each of sociologys mai.docx
1- What are the advantages and disadvantages of each of sociologys mai.docx
 
1- What are the various theories that we use to explain why people com.docx
1- What are the various theories that we use to explain why people com.docx1- What are the various theories that we use to explain why people com.docx
1- What are the various theories that we use to explain why people com.docx
 
1- Return the names- IDS- and average salary of the top 10 employees w.docx
1- Return the names- IDS- and average salary of the top 10 employees w.docx1- Return the names- IDS- and average salary of the top 10 employees w.docx
1- Return the names- IDS- and average salary of the top 10 employees w.docx
 
1- Research has shown that a- homogeneous groups are more creative tha.docx
1- Research has shown that a- homogeneous groups are more creative tha.docx1- Research has shown that a- homogeneous groups are more creative tha.docx
1- Research has shown that a- homogeneous groups are more creative tha.docx
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

1- What are the three fundamental elements of an effective security pr.docx

  • 1. 1. What are the three fundamental elements of an effective security program for information systems? 2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what types of access controls and permissions are probably configured? 4. What is the mechanism on a Windows server that lets you administer granular policies and permissions on a Windows network using role based access? 5. What is two-factor authentication, and why is it an effective access control technique? 6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. 7. Is it a good practice to include the account or username in the password? Why or why not? Solution Answer: 1. Identification, Authentication, and Authorization are the three fundamental elements of an effective security program for information systems. 2.Authentication and Authorization are the two elements, used by the Domain User Admin to create users and assign rights to resources. 3. read and write permissions should be properly configured. The file access type should be set to read only. 4. Group Policy Editor is used to administer granular policies and permissions on a Windows network using role-based access. 5. The two-factor authentication is a process, requires two different type of identification, such as an ID card and a pin code / password. The user must authenticate with two forms of ID to prove thier identity. So it is effective. 6.In Windows Server 2008 R2, permissions can be set for files and folders.o grant a user, access only to files owned by him and prevent him from accessing any others. 7.Including the account or username in the password is absolutely not a good or suggested practice. It is a common starting place for hackers when attempting to log in to someone’s account or when trying to use another person’s access.